How to deal with BEC attacks
Credit to Author: Oleg Sikorsky| Date: Tue, 17 Mar 2020 15:43:29 +0000
Companies worldwide regularly fall victim to business e-mail compromise attacks. We explain the danger and how to minimize it.
Read MoreRSS Reader for Computer Security Articles
Credit to Author: Oleg Sikorsky| Date: Tue, 17 Mar 2020 15:43:29 +0000
Companies worldwide regularly fall victim to business e-mail compromise attacks. We explain the danger and how to minimize it.
Read MoreCredit to Author: Mike Elgan| Date: Fri, 13 Mar 2020 11:14:00 -0700
The Covid-19 crisis is the Black Swan event of our lifetime. Here's how to hold it all together (while keeping employees apart).
Read MoreCredit to Author: Malwarebytes Labs| Date: Mon, 09 Mar 2020 20:07:46 +0000
![]() | |
A roundup of the previous week’s security headlines, including the introduction of a new series on child identity theft, an examination of law enforcement’s cybersecurity woes, a progress check on our stalkerware initiative, and more coronavirus scammers on the prowl. Categories: Tags: a week in securityawiscathay pacificcoronavirusexploitgdprmalwaremicrosoftMobilephishinground upsecurityTESCOweek in securityzynga |
The post A week in security (March 2 – 8) appeared first on Malwarebytes Labs.
Read MoreCredit to Author: Jeffrey Esposito| Date: Wed, 26 Feb 2020 19:30:51 +0000
Dave and Jeff discuss the EU’s response to Facebook’s pleas for regulation, ransomware shutting down a US energy company, Ring requiring 2FA, and more.
Read MoreCredit to Author: Trend Micro| Date: Tue, 25 Feb 2020 15:56:29 +0000
Variety is welcome in most walks of life, but not when it comes to the threat landscape. Yet that is unfortunately the reality facing modern cybersecurity professionals. As Trend Micro’s 2019 roundup report reveals, hackers have an unprecedented array of tools, techniques and procedures at their disposal today. With 52 billion unique threats detected by…
The post Hackers Expand Their Repertoire as Trend Micro Blocks 52 Billion Threats in 2019 appeared first on .
Read MoreCredit to Author: William Tsing| Date: Thu, 30 Jan 2020 16:00:00 +0000
![]() | |
Behind each cyberattack on the MSP is typically a system left unpatched, asset management undone, security officer not hired, or board who sees investment in security as a cost center rather than a long-term investment. Categories: Tags: advanced persistent threatadvanced persistent threatsAPTbreachcredential managementcredentialsdata breachhackingmanaged service providerMSPMSPsphishing |
The post Securing the MSP: why they’re their own worst enemy appeared first on Malwarebytes Labs.
Read MoreCredit to Author: Alex Gardner| Date: Fri, 14 Feb 2020 12:12:33 +0000
Find out how Sophos can help you keep your employees safe and sound this Valentine’s weekend.<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/4GeWqoaPk_M” height=”1″ width=”1″ alt=””/>
Read MoreCredit to Author: Todd VanderArk| Date: Thu, 13 Feb 2020 18:00:25 +0000
Transformation is a daunting task. In this series, I explore how change is possible when addressing the components of people and technology that make up an organization.
The post Changing the Monolith—Part 4: Quick tech wins for a cloud-first world appeared first on Microsoft Security.
Read More